Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bucharest

Region: Bucuresti

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '194.150.84.0 - 194.150.87.255'

% Abuse contact for '194.150.84.0 - 194.150.87.255' is 'abuse@tennet.ro'

inetnum:        194.150.84.0 - 194.150.87.255
netname:        TENNET-NET
country:        RO
org:            ORG-TLS5-RIPE
admin-c:        MG21773-RIPE
tech-c:         CP3708-RIPE
status:         ASSIGNED PI
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         TENNETLINK-MNT
mnt-routes:     TENNETLINK-MNT
mnt-domains:    TENNETLINK-MNT
created:        2006-09-01T10:14:47Z
last-modified:  2016-04-14T08:44:57Z
source:         RIPE
sponsoring-org: ORG-ETS1-RIPE

organisation:   ORG-TLS5-RIPE
org-name:       TENNET LINK SRL
country:        RO
org-type:       OTHER
address:        Str. Grivita Nr.395, Bl.M2, Sc. C, Et. 5, Ap.17
admin-c:        MG21773-RIPE
tech-c:         CF3992-RIPE
abuse-c:        AR34741-RIPE
mnt-ref:        TENNETLINK-MNT
mnt-by:         TENNETLINK-MNT
created:        2015-12-17T19:37:48Z
last-modified:  2022-12-01T16:55:43Z
source:         RIPE # Filtered

person:         Cristian Predesel
address:        Bd. Bucurestii Noi, Bucharest, RO
phone:          +40-722-137621
remarks:        ------------------------------------------------
remarks:        | Please do not send me any abuse complaints. |
remarks:        | Use abuse@thorpanel.com for that or contact |
remarks:        | your service provider or local authorities |
remarks:        | ! DO NOT CALL ME REGARDING ABUSE ISSUES ! |
remarks:        | Please do not make an abuse yourself by |
remarks:        | disregarding this request ! |
remarks:        | I WILL NOT HELP YOU WITH YOUR PROBLEM ! |
remarks:        ------------------------------------------------
nic-hdl:        CP3708-RIPE
mnt-by:         GCN-MNT
created:        2006-08-30T08:43:20Z
last-modified:  2017-10-30T21:51:02Z
source:         RIPE # Filtered

person:         Macri Georgiana
address:        Bucuresti,Romania
phone:          +40-731123100
nic-hdl:        MG21773-RIPE
mnt-by:         TENNETLINK-MNT
created:        2015-12-17T19:29:29Z
last-modified:  2015-12-17T19:29:29Z
source:         RIPE

% Information related to '194.150.84.0/24AS39543'

route:          194.150.84.0/24
descr:          TENNET TELECOM
origin:         AS39543
mnt-by:         TENNET-MNT
created:        2023-09-25T11:33:28Z
last-modified:  2023-09-25T11:33:28Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.150.84.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.150.84.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032800 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 21:47:38 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 242.84.150.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.84.150.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.101.0 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.0  user=root
Failed password for root from 185.220.101.0 port 43617 ssh2
Failed password for root from 185.220.101.0 port 43617 ssh2
Failed password for root from 185.220.101.0 port 43617 ssh2
Failed password for root from 185.220.101.0 port 43617 ssh2
2019-06-22 19:34:52
128.106.251.174 attackspam
Telnetd brute force attack detected by fail2ban
2019-06-22 19:23:15
218.92.0.172 attackspambots
ssh-bruteforce
2019-06-22 19:19:04
36.68.4.236 attackbotsspam
Jun 22 13:40:08 nginx sshd[24923]: Invalid user user1 from 36.68.4.236
Jun 22 13:40:08 nginx sshd[24923]: Received disconnect from 36.68.4.236 port 25837:11: Bye Bye [preauth]
2019-06-22 19:40:19
153.3.122.159 attackbots
Jun 22 06:46:16 apollo sshd\[28035\]: Failed password for root from 153.3.122.159 port 48878 ssh2Jun 22 06:46:18 apollo sshd\[28035\]: Failed password for root from 153.3.122.159 port 48878 ssh2Jun 22 06:46:21 apollo sshd\[28035\]: Failed password for root from 153.3.122.159 port 48878 ssh2
...
2019-06-22 19:09:28
180.250.18.20 attackspam
Jun 22 06:21:49 pornomens sshd\[3452\]: Invalid user jenkins from 180.250.18.20 port 47631
Jun 22 06:21:49 pornomens sshd\[3452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.18.20
Jun 22 06:21:51 pornomens sshd\[3452\]: Failed password for invalid user jenkins from 180.250.18.20 port 47631 ssh2
...
2019-06-22 19:36:03
185.173.35.37 attackspam
firewall-block, port(s): 873/tcp
2019-06-22 19:47:02
185.220.102.8 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.8  user=root
Failed password for root from 185.220.102.8 port 36417 ssh2
Failed password for root from 185.220.102.8 port 36417 ssh2
Failed password for root from 185.220.102.8 port 36417 ssh2
Failed password for root from 185.220.102.8 port 36417 ssh2
2019-06-22 19:39:22
143.215.172.79 attackbots
Port scan on 1 port(s): 53
2019-06-22 19:00:12
112.85.42.189 attack
Jun 22 07:17:52 mail sshd\[27793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
Jun 22 07:17:54 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2
Jun 22 07:17:56 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2
Jun 22 07:17:58 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2
Jun 22 07:18:44 mail sshd\[27903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2019-06-22 19:49:39
157.230.163.6 attackbotsspam
$f2bV_matches
2019-06-22 19:02:53
197.51.201.16 attack
Automatic report - Web App Attack
2019-06-22 19:45:53
40.77.167.17 attackspam
SQL Injection
2019-06-22 19:08:29
36.79.254.155 attackspambots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:21:19]
2019-06-22 19:25:59
52.160.192.165 attack
Jun 22 00:24:06 localhost kernel: [12421639.493846] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=13517 PROTO=UDP SPT=30219 DPT=111 LEN=48 
Jun 22 00:24:06 localhost kernel: [12421639.493875] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=13517 PROTO=UDP SPT=30219 DPT=111 LEN=48 
Jun 22 00:24:18 localhost kernel: [12421652.071158] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=23253 PROTO=UDP SPT=30219 DPT=111 LEN=48 
Jun 22 00:24:18 localhost kernel: [12421652.071182] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=52.160.192.165 DST=[mungedIP2] LEN=68 TOS=0x00 PREC=0x00 TTL=244 ID=23253 PROTO=UDP SPT=30219 DPT=111 LEN=48
2019-06-22 18:55:20

Recently Reported IPs

241.98.47.127 156.207.26.125 110.77.226.19 2606:4700:10::6814:5887
2606:4700:10::6814:4754 2606:4700:10::6816:4150 2606:4700:10::6816:614 2606:4700:10::6814:5111
2606:4700:10::6814:9902 121.230.89.81 2606:4700:10::6816:1118 2606:4700:10::6814:8803
2606:4700:10::ac43:1156 205.119.118.82 34.118.32.54 185.247.137.226
54.65.27.208 110.77.226.213 121.230.89.72 2606:4700:10::6816:1200